cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
Bulletin of Electrical Engineering and Informatics
ISSN : -     EISSN : -     DOI : -
Core Subject : Engineering,
Bulletin of Electrical Engineering and Informatics (Buletin Teknik Elektro dan Informatika) ISSN: 2089-3191, e-ISSN: 2302-9285 is open to submission from scholars and experts in the wide areas of electrical, electronics, instrumentation, control, telecommunication and computer engineering from the global world. The journal publishes original papers in the field of electrical, computer and informatics engineering.
Arjuna Subject : -
Articles 51 Documents
Search results for , issue "Vol 9, No 3: June 2020" : 51 Documents clear
Application of phase-metric compensation method for geoelectric control of near-surface geodynamic processes Kuzichkin O. R.; Vasilyev G. S.; Grecheneva A. V.; Mikhaleva E. V.; Baknin M. D.; Surzhik D. I.
Bulletin of Electrical Engineering and Informatics Vol 9, No 3: June 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (672.051 KB) | DOI: 10.11591/eei.v9i3.1727

Abstract

This work is devoted to the application of the compensation method of geoelectric control using the field phase characteristics for the detection and localization of geodynamic processes on example of the development of the karst-suffusion cavity. High noise immunity of the phase-metric registration method of geoelectric signals in comparison with amplitude parameters of the anomalous components of electromagnetic field, usually used to analyze the results of observations, is noted. A formalized approach to the use of phase characteristics of the field for the interpretation of monitoring data and associated problem of geodynamic processes localization is developed. In the framework of this approach, the section parameters are proposed to determine by the minimum sum of weighted mean square interpretation error and regularizing functional containing a priori information about the geoelectric section. To check localization possibility of the spherical karst-suffusion cavity, simulation of the amplitude and phase anomalous components of the field potential, as well as the standard error of heterogeneity localization, when moving the sphere center along the installation profile, is carried out. Simulation has shown a good potential differentiation from the inhomogeneity position, the highest accuracy of localization is achieved with combined use of amplitude and phase field components in the problem of inhomogeneity localization.
Information processing in info-communication media of geodynamic monitoring on the basis of adaptive queuing system Kuzichkin O. R.; Eremenko V. T.; Loginov I. V.; Grecheneva A. V.; Eremenko A. V.; Dorofeev N. V.
Bulletin of Electrical Engineering and Informatics Vol 9, No 3: June 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (705.915 KB) | DOI: 10.11591/eei.v9i3.1726

Abstract

The paper considers the problem of modeling the processing of geodynamic information in a reconfigurable information-communication environment of geodynamic monitoring based on an adaptive queuing system. It was established that due to the complexity and diversity of geodynamic information, the number of geodynamic control points is expanding and the number of controlled parameters, the number of controlled objects of natural-technical systems (NTS) are increasing. This leads to an increase in the overall load on the info-communication monitoring environment, an increase in the processing time and the response time of the NTS geodynamic stability control system to negative changes. This leads to the need for adaptive optimization of the info-communication environment of geodynamic monitoring. The model of a composite stream describing the change in the nature of the tasks performed by geodynamic monitoring was determined, approaches to reconfiguration management based on minimization of the loss functional were proposed. The constructed model of the process of functioning and the analytical dependencies obtained for it allow analyzing the process of processing geodynamic information in info-communication environments to optimize the mechanisms of their functioning.
Determination of transient thermal characteristics for thermal electric behavioral models of integrated circuits Drakin A. Yu; Potapov L. A.; Shkolin A. N.
Bulletin of Electrical Engineering and Informatics Vol 9, No 3: June 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (687.105 KB) | DOI: 10.11591/eei.v9i3.1725

Abstract

In the current study, it was tried to describe a method for determining thermal characteristics of integrated micro-circuits to identify thermal parameters of multidisciplinary (thermal-electric) behavioral models. The problem is solved on the example of high-frequency pulse voltage converters. A solution was proposed to refine the minimum structure of the thermoelectric model based on an iterative least squares method using the Levenberg-Marquardt  algorithm, as well as a graph of the spectral den-sity of time constants. This made it possible to reduce the influence of the filtering factor in the  deconvolution operation when building a thermal model using the structural function of the thermal characteristic transition. Also, the results obtained can be used to build integrated circuits (IC) behavioral models, taking into account the thermal processes occurring in them.
Application of deep learning to enhance the accuracy of intrusion detection in modern computer networks Jafar Majidpour; Hiwa Hasanzadeh
Bulletin of Electrical Engineering and Informatics Vol 9, No 3: June 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (674.163 KB) | DOI: 10.11591/eei.v9i3.1724

Abstract

Application of deep learning to enhance the accuracy of intrusion detection in modern computer networks were studied in this paper. The identification of attacks in computer networks is divided in to two categories of intrusion detection and anomaly detection in terms of the information used in the learning phase. Intrusion detection uses both routine traffic and attack traffic. Abnormal detection methods attempt to model the normal behavior of the system, and any incident that violates this model is considered to be a suspicious behavior. For example, if the web server, which is usually passive, tries to There are many addresses that are likely to be infected with the worm. The abnormal diagnostic methods are Statistical models, Secure system approach, Review protocol, Check files, Create White list, Neural Networks, Genetic Algorithm, Vector Machines, decision tree. Our results have demonstrated that our approach offers high levels of accuracy, precision and recall together with reduced training time. In our future work, the first avenue of exploration for improvement will be to assess and extend the capability of our model to handle zero-day attacks.
Design aspects of high voltage transmission line Jabbar Qasim Fahad; Riyadh Kamil Chillab
Bulletin of Electrical Engineering and Informatics Vol 9, No 3: June 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (601.485 KB) | DOI: 10.11591/eei.v9i3.2062

Abstract

The transmission lines are very important in the transmitted of electrical power, and the process of selecting the voltage of the line is an important task in the design and implementation process. The process of transferring electrical power from one side then onto the next place for long away. While maintaining the percentage regulation within the permissible limits is an important problem in the transfer of energy. In electrical transmission line there are important elements are resistance, inductance and capacitance. The purpose of this paper is to study and calculate economic high-tension voltage and selection of overhead line conductor ACSR.
MRI brain tumor segmentation: A forthright image processing approach Noor Elaiza Abd Khalid; Muhammad Firdaus Ismail; Muhammad Azri AB Manaf; Ahmad Firdaus Ahmad Fadzil; Shafaf Ibrahim
Bulletin of Electrical Engineering and Informatics Vol 9, No 3: June 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (467.376 KB) | DOI: 10.11591/eei.v9i3.2063

Abstract

Brain tumor is a collection of cells that grow in an abnormal and uncontrollable way. It may affect the regular function of the brain since it grows inside the skull region. As a brain tumor can be possibly led to cancer, early detection in Computed Tomography (CT) or Magnetic Resonance Imaging (MRI) scanned images are crucial. Thus, this paper proposed a forthright image processing approach towards detection and localization of brain tumor region The approach consists of a few stages such as pre-processing, edge detection and segmentation. The pre-processing stage converts the original image into a greyscale image, and noise removal if necessary. Next, the image is enhanced using image enhancement techniques. It is then followed by edge detection using Sobel and Canny algorithms. Finally, the segmentation is applied to highlight the tumor with morphological operations towards the affected region in the MRI images. The in-depth analysis is measured using a confusion matrix. From the results, it signifies that the proposed approach is capable to provide decent segmentation of brain tumor from various MRI brain images.
PNSCares: The android based mobile application to manage student complaints N. Illias; N. H. Abdul Hamid; Z. A. Shaffiei
Bulletin of Electrical Engineering and Informatics Vol 9, No 3: June 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (579.607 KB) | DOI: 10.11591/eei.v9i3.2065

Abstract

Managing the complaint is tough to handle, efficient response to the complaints from the customer can be an indicator to measure an organization’s performance. We’ve chosen Politeknik Nilai as one of the institutions that are facing daily complaints from the students and parents. Currently, they are using the manual form to lodge a complaint and receive the feedback via email. In this study, we developed an android based mobile application to manage the students’ complaint. With mobile apps, the management can prevent the loss of complaint forms and keep track of the records. This system will send feedback and notification directly via students’ mobile phone. This study referred to the ten principles for effective complaint handling by Ombudsman. We only referred to eight principles to construct the PNSCares. The methodology used to develop mobile apps is using the Mobile Application Development Life Cycle (MADLC). System Usability Scale (SUS) is used to measure the effectiveness of the mobile apps. The feedbacks from ten respondents on the PNSCares prototype are good with 72 scores in SUS for perceived usefulness and ease of use factor. Based on the result, the prototype is effective and easy to use.
City i-Tick: The android based mobile application for students’ attendance at a university S. R. Alimin; N. H. Abdul Hamid; Z. A. Nasruddin
Bulletin of Electrical Engineering and Informatics Vol 9, No 3: June 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (707.027 KB) | DOI: 10.11591/eei.v9i3.2078

Abstract

This paper presents City i-Tick, the android based mobile application for students’ attendance at a university. In this study, we developed mobile application for lecturers to take students’ attendance in City University, Petaling Jaya. Managing students’ attendance during lecture periods has become a difficult challenge. The research objectives for this study are to identify user requirement for City i-Tick, to design and develop City i-Tick, and to demonstrate the prototype of City i-Tick. The study is a narrative participatory design and exploits Design Thinking as the research methodology. City i-Tick was successfully validated by 14 lecturers and System Usability Scale (SUS) was used to determine the findings of the study. We found that City i-Tick is effective for lecturers in taking attendance because it is easy to use, easy to learn, and the users feel confident when using this application.
Automated segmentation and detection of T1-weighted magnetic resonance imaging brain images of glioma brain tumor Nur Hanina Izani Muhammad Zaihani; Rosniza Roslan; Zaidah Ibrahim; Khyrina Airin Fariza Abu Samah
Bulletin of Electrical Engineering and Informatics Vol 9, No 3: June 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (527.118 KB) | DOI: 10.11591/eei.v9i3.2079

Abstract

There are numerous studies on brain imaging applications.  The statistics in Malaysia showed that glioma is one of the most common type disease in brain tumor.  Glioma brain tumor is an abnormal growth of glial cells inside the brain tissues which known as cerebral tissues.  Radiologist commonly used Magnetic Resonance Imaging (MRI) image sequences to diagnose the brain tumor.  However, manual examination of the brain tumor diagnosis by radiologist is difficult and time-consuming task as tumors are occurred in variability of shape and appearance.  They will also inject a gadolinium contrast agent to enhance the image modality which will give the side effects to the patients.  Therefore, this paper presents an automated segmentation and detection of MRI brain images using Sobel edge detection and mathematical morphology operations.  The total of 30 glioma T1-Weighted MRI brain images are obtained from Brain Tumor Image Segmentation Benchmark (BRATS).  The results of segmentation and detection are quantitatively evaluated by using Area Overlap which produced the accuracy rate of 80.2% and shows that the presented methods are promising.
Security performance analysis for power domain NOMA employing in cognitive radio networks Thi-Anh Hoang; Chi-Bao Le; Dinh-Thuan Do
Bulletin of Electrical Engineering and Informatics Vol 9, No 3: June 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1076.26 KB) | DOI: 10.11591/eei.v9i3.1639

Abstract

The power domain non-orthogonal multiple access (NOMA) technique introduces one of the fundamental characteristics and it exhibits the possibility of users to decode the messages of the other paired users on the same resources. In cognitive radio inspired NOMA (CR-NOMA), the base station (BS) has to serve untrusted users or users with different security clearance. This phenomenon raises a security threat particularly in such CR-NOMA. This paper develops a tractable analysis framework to evaluate the security performance of cooperative non-orthogonal multiple access (NOMA) in cognitive networks, where relay is able to serve two far NOMA users in the presence of external eavesdropper. In particular, we study the secrecy outage probability in a two-user NOMA system. This situation happens in practical the BS is pairing a legitimate user with another untrusted user. Main reason is that the non-uniform distribution in terms of trusted and untrusted users in the cell. By performing numerical results demonstrate the performance improvements of the proposed NOMA scheme in comparison to that of several situations in terms of different parameters. Furthermore, the security performance of NOMA is shown to verify the derived expressions.

Filter by Year

2020 2020


Filter By Issues
All Issue Vol 14, No 6: December 2025 Vol 14, No 5: October 2025 Vol 14, No 4: August 2025 Vol 14, No 3: June 2025 Vol 14, No 2: April 2025 Vol 14, No 1: February 2025 Vol 13, No 6: December 2024 Vol 13, No 5: October 2024 Vol 13, No 4: August 2024 Vol 13, No 3: June 2024 Vol 13, No 2: April 2024 Vol 13, No 1: February 2024 Vol 12, No 6: December 2023 Vol 12, No 5: October 2023 Vol 12, No 4: August 2023 Vol 12, No 3: June 2023 Vol 12, No 2: April 2023 Vol 12, No 1: February 2023 Vol 11, No 6: December 2022 Vol 11, No 5: October 2022 Vol 11, No 4: August 2022 Vol 11, No 3: June 2022 Vol 11, No 2: April 2022 Vol 11, No 1: February 2022 Vol 10, No 6: December 2021 Vol 10, No 5: October 2021 Vol 10, No 4: August 2021 Vol 10, No 3: June 2021 Vol 10, No 2: April 2021 Vol 10, No 1: February 2021 Vol 9, No 6: December 2020 Vol 9, No 5: October 2020 Vol 9, No 4: August 2020 Vol 9, No 3: June 2020 Vol 9, No 2: April 2020 Vol 9, No 1: February 2020 Vol 8, No 4: December 2019 Vol 8, No 3: September 2019 Vol 8, No 2: June 2019 Vol 8, No 1: March 2019 Vol 7, No 4: December 2018 Vol 7, No 3: September 2018 Vol 7, No 2: June 2018 Vol 7, No 1: March 2018 Vol 6, No 4: December 2017 Vol 6, No 3: September 2017 Vol 6, No 2: June 2017 Vol 6, No 1: March 2017 Vol 5, No 4: December 2016 Vol 5, No 3: September 2016 Vol 5, No 2: June 2016 Vol 5, No 1: March 2016 Vol 4, No 4: December 2015 Vol 4, No 3: September 2015 Vol 4, No 2: June 2015 Vol 4, No 1: March 2015 Vol 3, No 4: December 2014 Vol 3, No 3: September 2014 Vol 3, No 2: June 2014 Vol 3, No 1: March 2014 Vol 2, No 4: December 2013 Vol 2, No 3: September 2013 Vol 2, No 2: June 2013 Vol 2, No 1: March 2013 Vol 1, No 4: December 2012 Vol 1, No 3: September 2012 Vol 1, No 2: June 2012 Vol 1, No 1: March 2012 List of Accepted Papers (with minor revisions) More Issue